0x01 closed configuration
Also found 'is commented out
A wave of temptation to find out what information will return the correct error pages are the same
Before we approach the filter function is to add \ to eat. The way we get type url form is submitted, the data will pass URLencode, how the method is used in post injection type which introduces a new approach us here. Utf-8 converted to utf-16 or utf-32, for example, 'Switch to utf-16'. (Http://tool.chinaz.com/tools/urlencode.aspx) we can use this approach to try.
0x01 and fifth off as being given by injection https://www.cnblogs.com/-zhong/p/10892439.html
�' union select count(*), concat((select database()), floor(rand()*2))as a from information_schema.tables group by a#